• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 66
  • 28
  • 10
  • 6
  • 6
  • 5
  • 4
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 148
  • 28
  • 22
  • 20
  • 20
  • 20
  • 19
  • 18
  • 17
  • 16
  • 16
  • 15
  • 14
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Entwicklung eines Systems zur Erfassung und Untersuchung von Certificate Transparency Logs

Meesters, Johannes 13 July 2024 (has links)
Angesichts der zentralen Rolle der Root-Zertifizierungsstellen als Vertrauensanker der Web PKI und der in der Vergangenheit aufgetretenen Vorfälle mit unberechtigt oder inkorrekt ausgestellten Zertifikaten, ist die Transparenz und Verantwortlichkeit dieser Root CAs von großer Bedeutung. Seit der Einführung von Certificate Transparency Logs werden alle von Certificate Authorities ausgestellten Zertifikate in diese öffentlichen Logs eingetragen. Die Arbeit stellt die Problematik der eingeschränkten Zugänglichkeit dieser Daten für die Wissenschaft dar und entwickelt ein Werkzeug, dass eine unabhängige Aufzeichnung und Auswertung von Certificate Transparency Logs ermöglicht. Das entwickelte System nutzt eine containerbasierte Architektur und Elasticsearch zur effizienten Speicherung und Analyse der Daten. Es bewältigt ein hohes Datenaufkommen von durchschnittlich 25 Millionen Log-Einträgen pro Tag und ermöglicht eine anpassbare Datenverarbeitung und -auswertung. Die Vorverarbeitung und Indexierung sowie die Auswertung der Daten erfolgte mit Python, was eine flexible Anpassung des Systems an unterschiedliche Forschungsfragen erlaubt. Über einen Zeitraum von 42 Tagen wurden insgesamt 645 Millionen CT Log-Einträge aufgezeichnet und analysiert. Aus den Auswertungen geht hervor, wie verschiedene CAs und deren Root-Zertifikate genutzt werden und wie stark die unterschiedlichen CT Logs von CAs verwendet werden. Die Arbeit identifiziert jedoch auch Herausforderungen, wie den hohen Speicherbedarf und notwendige Optimierungen in der Datenindexierung.:1 Einleitung 1.1 Problemstellung 1.2 Zielstellung 2 Grundlagen 2.1 X509-Zertifikate 2.1.1 Felder 2.1.2 Erweiterungen 2.2 Certificate Transparency 2.2.1 Certificate Transparency Log 2.2.2 Überprüfung durch User Agents 2.2.3 Überprüfung durch Monitors 2.2.4 Eintragung durch Certificate Authorities 3 Konzeptionierung 3.1 Abfrage der CT Logs 3.2 Verarbeitung der Zertifikate 3.3 Speicherung & Auswertung der Daten 3.4 Überwachung 3.5 Docker 4 Implementierung 4.1 Plattform 4.2 Überwachung 4.3 certstream-server 4.4 Verarbeitung 4.4.1 Pufferung (stream-to-queue-publisher) 4.4.2 Vorverarbeitung (cert-indexer) 4.5 Elasticsearch 4.5.1 Speicherverbrauch 4.5.2 Field Mappings 5 Auswertung 5.1 Logs & Log-Betreiber 5.2 Certificate Authorites 5.3 Zertifikats-Größe 5.4 Gültigkeitsdauer 6 Schluss 6.1 Fazit 6.2 Ausblick A Beispiel X509 Leaf-Zertifikat B Beispiel X509 Root-Zertifikat C Beispiele Elasticsearch Abfragen Literatur Abbildungsverzeichnis Tabellenverzeichnis / In view of the central role of the root certification authorities as trust anchors of the Web PKI and the incidents that have occurred in the past with unauthorised or incorrectly issued certificates, the transparency and accountability of these root CAs is of great importance. With the introduction of Certificate Transparency Logs, all certificates issued by Certificate Authorities are now entered in public logs. The work presents the problem of the limited accessibility of this data for science and develops a tool that enables an independent recording and evaluation of Certificate Transparency Logs. The developed system uses a container-based architecture and Elasticsearch to efficiently store and analyse the data. It can handle a high volume of data, averaging 25 million log entries per day, and enables customisable data processing and analysis. Python was used to pre-process, index and analyse the data, allowing the system to be flexibly adapted to different research questions. A total of 645 million CT log entries were recorded and analysed over a period of 42 days. The analyses show how different CAs and their root certificates are used and how much the different CT logs are used by CAs. However, the work also identifies challenges, such as the high memory requirements and necessary optimisations in data indexing.:1 Einleitung 1.1 Problemstellung 1.2 Zielstellung 2 Grundlagen 2.1 X509-Zertifikate 2.1.1 Felder 2.1.2 Erweiterungen 2.2 Certificate Transparency 2.2.1 Certificate Transparency Log 2.2.2 Überprüfung durch User Agents 2.2.3 Überprüfung durch Monitors 2.2.4 Eintragung durch Certificate Authorities 3 Konzeptionierung 3.1 Abfrage der CT Logs 3.2 Verarbeitung der Zertifikate 3.3 Speicherung & Auswertung der Daten 3.4 Überwachung 3.5 Docker 4 Implementierung 4.1 Plattform 4.2 Überwachung 4.3 certstream-server 4.4 Verarbeitung 4.4.1 Pufferung (stream-to-queue-publisher) 4.4.2 Vorverarbeitung (cert-indexer) 4.5 Elasticsearch 4.5.1 Speicherverbrauch 4.5.2 Field Mappings 5 Auswertung 5.1 Logs & Log-Betreiber 5.2 Certificate Authorites 5.3 Zertifikats-Größe 5.4 Gültigkeitsdauer 6 Schluss 6.1 Fazit 6.2 Ausblick A Beispiel X509 Leaf-Zertifikat B Beispiel X509 Root-Zertifikat C Beispiele Elasticsearch Abfragen Literatur Abbildungsverzeichnis Tabellenverzeichnis
112

A Comprehensive and Comparative Examination of Healthcare Data Breaches: Assessing Security, Privacy, and Performance

Al Kinoon, Mohammed 01 January 2024 (has links) (PDF)
The healthcare sector is pivotal, offering life-saving services and enhancing well-being and community life quality, especially with the transition from paper-based to digital electronic health records (EHR). While improving efficiency and patient safety, this digital shift has also made healthcare a prime target for cybercriminals. The sector's sensitive data, including personal identification information, treatment records, and SSNs, are valuable for illegal financial gains. The resultant data breaches, increased by interconnected systems, cyber threats, and insider vulnerabilities, present ongoing and complex challenges. In this dissertation, we tackle a multi-faceted examination of these challenges. We conducted a detailed analysis of healthcare data breaches using the VERIS (Vocabulary for Event Recording and Incident Sharing) dataset. We delve into the trends of these breaches, investigate the attack vectors, and identify patterns to inform effective mitigation strategies. We conducted a spatiotemporal analysis of the VERIS and the Office of Civil Rights (OCR) datasets. We explored the geographical and temporal distribution of breaches and focused on the types of targeted assets to decipher the attackers' motives. Additionally, we conducted a detailed analysis of hospitals' online presence, focusing on their security and performance features. By comparing government, non-profit, and private hospitals in the U.S., we examined their security practices, content, and domain attributes to highlight the differences and similarities in the digital profiles of these hospital types. Furthermore, we expand our scope to include a comparative sector-based study investigating data breaches across various critical sectors. This broader view provides a contextual understanding of the healthcare sector's unique vulnerabilities compared to other sectors. Overall, this dissertation contributes fundamental insights into healthcare data breaches and hospitals' digital presence and underscores the urgent need for enhanced understanding and implementation of robust security measures in this vitally important sector, striving for a balance between technological advancement and data security.
113

Mortalidade materna no município de São Paulo, 2000 a 2008 / Maternal Mortality in the city of São Paulo, 2000 to 2008

Zacarias, Tatiane Sano Furukawa 21 February 2013 (has links)
Introdução: A mortalidade materna é um grande problema de Saúde Pública no Brasil e no mundo. Atinge muitas mulheres e representa um indicador de pobreza e iniquidade social. Objetivo: Analisar as mortes maternas ocorridas no município de São Paulo em uma série histórica de 2000 a 2008. Métodos: Estudo ecológico, que analisou os óbitos maternos ocorridos em residentes do município de São Paulo entre os anos de 2000 a 2008. Foram utilizados dados das Declarações de Óbito e dos relatórios do Comitê de Mortalidade Materna. O mapa de exclusão/inclusão social e as áreas homogêneas dos 96 distritos administrativos foram utilizados como unidades de análise. Foram calculadas as razões de mortalidade materna, o percentual de subnotificação de causas maternas declaradas e fator de correção. Foram analisadas as causas que ocultavam os óbitos maternos. A análise de tendência da mortalidade para o município foi realizada por meio de modelos de regressão polinomial e a para análise de correlação utilizou-se o teste de correlação de Pearson. Foi considerado o nível de significância de 5 por cento (p<0,05). Para análise do preenchimento das variáveis 43 e 44, as Declarações de óbito foram localizadas no arquivo morto da Prefeitura Municipal. Resultados: Ocorreram 877 óbitos. A Razão de Mortalidade Materna (RMM) foi de 53,2 óbitos/100.000 Nascidos Vivos. A série histórica apresentou tendência decrescente estatisticamente significativa, com redução de 1,73 ao ano. As menores RMM foram encontradas nas áreas homogêneas de menor exclusão social, e as maiores, nas áreas de maior exclusão. As áreas mais excluídas apresentaram risco de morte materna aproximadamente três vezes maior que na área menos excluída. A correlação de Pearson revelou moderada correlação negativa entre a RMM e o índice de exclusão/inclusão global (-0,37), o índice de desenvolvimento humano (-0,40) e de autonomia (-0,36). As principais causas de morte materna foram as obstétricas indiretas. O percentual médio de subnotificação das causas maternas foi de 45,38 por cento, e o fator de correção médio foi 1,83. Destacou-se o grande percentual de causas mal definidas declaradas. Entre 2004 a 2006, 43,4 por cento das declarações apresentaram os campos 43 e 44 preenchidos corretamente. A maioria das declarações apresentou três diagnósticos informados. Conclusões: A RMM mostrou relação com as condições socioeconômicas. É necessário maior investimento em treinamentos para o correto preenchimento das Declarações de óbito. É necessário a implementação mais efetiva de ações de saúde voltadas para a mortalidade materna / Background: Maternal mortality is a big problem of public health in Brazil and in the world. Affects many women and is an indicator of poverty and social inequity. Objective: To analyse maternal deaths occurred in the city of São Paulo in a series from 2000 to 2008. Methods: Ecologic study, which analyzed maternal deaths that occurred among residents of city of São Paulo during the years 2000 to 2008. Data were used from deaths certificates and reports of the Committee on Maternal Mortality. The map of social inclusion/exclusion and homogeneous areas of the 96 districts were used as units of analysis. We calculated maternal mortality ratios, the percentage of underreporting of maternal causes and the correction factor. We analyzed the causes that hid maternal deaths. The analysis of trends in mortality for the city was conducted using polynomial regression models and for correlation analysis used the test of correlation of Pearson. It was considered the significance level of 5 per cent (p<0,05). For examination of completing the variables 43 and 44, the deaths certificates were located in the archive of the city. Results: There were 877 deaths. The Maternal Mortality Ratio (MMR) was 53,2/100.000 live births. The series showed trend decreasing statistically significant, with a decrease of 1,73 per year. The lower MMR were found in homogeneous areas with lower social exclusion and higher than areas with higher exclusion. Areas most excluded showed risk of maternal deaths about three times higher than in area less excluded. The correlation of Pearson showed moderate negative correlation between MMR and index inclusion/exclusion overall (-0,37), the index of human development (-0,40) and the index of autonomy (-0,36). The main causes of maternal deaths were obstetric indirect. The mean percentage of underreporting of maternal causes was 45,38 per cent , and the correction factor medium was 1,83. We emphasize the high percentage of illdefined causes declared. During 2004 and 2006, 43,4 per cent of the declarations presented fields 43 and 44 filled in correctly. Most declarations presented three diagnoses listed. Conclusion: The MMR showed relationship with socioeconomic conditions. It is necessary greater investment in training for correct completion of death certificates. It is necessary the implementation more effective heath actions to maternal mortality
114

Striving for National Fitness: Eugenics in Australia 1910s to 1930s

Wyndham, Diana Hardwick January 1996 (has links)
Eugenics movements developed early this century in more than 20 countries, including Australia. However, for many years the vast literature on eugenics focused almost exclusively on the history of eugenics in Britain and America. While some aspects of eugenics in Australia are now being documented, the history of this movement largely remained to be written. Australians experienced both fears and hopes at the time of Federation in 1901. Some feared that the white population was declining and degenerating but they also hoped to create a new utopian society which would outstrip the achievements, and avoid the poverty and industrial unrest, of Britain and America. Some responded to these mixed emotions by combining notions of efficiency and progress with eugenic ideas about maximising the growth of a white population and filling the "empty spaces". It was hoped that by taking these actions Australia would avoid "racial suicide" or Asian invasion and would improve national fitness, thus avoiding "racial decay" and starting to create a "paradise of physical perfection". This thesis considers the impact of eugenics in Australia by examining three related propositions: 1. that from the 1910s to the 1930s, eugenic ideas in Australia were readily accepted because of concerns about declining birth rate; 2. that, while mainly derivative, Australian eugenics had several distinctive Australian qualities; 3. that eugenics has a legacy in many disciplines, particularly family planning and public health. This examination of Australian eugenics is primarily from the perspective of the people, publications and organisations which contributed to this movement in the first half of this century. In addition to a consideration of their achievements, reference is also made to the influence which eugenic ideas had in such diverse fields as education, immigration, law, literature, politics, psychology and science.
115

Subsidizing Global Solar Power : A contemporary legal study of existing and potential international incentives for solar PV investments in developing countries

Arnesson, Daniel January 2013 (has links)
With national cuts on solar PV subsidies and the current “oversupply” of panels, the global solar market is clearly threatened by a contraction. Yet, the need for more solar power is apparent, particularly for the world’s poor and vulnerable population. Instead of securing modern energy access for these people, trade interests have triggered a counterproductive solar trade war. This contemporary legal study addresses these issues by examining existent and potential instruments for stimulating a North-to-South solar capital flow. The research finds that recent reforms of the CDM will do little difference from previous deficiencies, as local investment barriers are not reflected in the monetary support of the clean development mechanism. Competing technologies are successfully keeping solar out of the game while baseline requirements are undermining the poor. Inspired by national renewable energy law and policy, international alternatives could address these shortcomings. While feed-in tariffs have been commonly advocated, the REC model seems far more appropriate in an international context. Its ability to be traded separately from the electricity makes it a perfect candidate as a substitute for the CDM. Entrusted with certain features it could address the geographical unbalance and provide with greater investor certainty. But the scheme(s) are under current WTO regulations required to be non-discriminatory, making it highly questionable to believe that developed countries would ever fund such incentive. It is not likely that solar capital exporters want Chinese solar PV manufacturers, who are already receiving significant production subsidies, to receive the same benefits as other producers. However, if countries adversely effected by subsidies where allowed to offset the injury by discriminating Chinese producers in international REC schemes, the Author believes that it would be easier to sell such a concept and implement it, for the benefits of climate change mitigation and adaptation as well as the world’s vulnerable and poor nations. However, this would require extensive reforms under WTO which the Author calls for.
116

The use of technology to automate the registration process within the Torrens system and its impact on fraud : an analysis

Low, Rouhshi January 2008 (has links)
Improvements in technology and the Internet have seen a rapid rise in the use of technology in various sectors such as medicine, the courts and banking. The conveyancing sector is also experiencing a similar revolution, with technology touted as able to improve the effectiveness of the land registration process. In some jurisdictions, such as New Zealand and Canada, the paper-based land registration system has been replaced with one in which creation, preparation, and lodgement of land title instruments are managed in a wholly electronic environment. In Australia, proposals for an electronic registration system are under way. The research question addressed by this thesis is what would be the impact on fraud of automating the registration process. This is pertinent because of the adverse impact of fraud on the underlying principles of the Torrens system, particularly security of title. This thesis first charts the importance of security of title, examining how security of title is achieved within the Torrens system and the effects that fraud has on this. Case examples are used to analyse perpetration of fraud under the paper registration system. Analysis of functional electronic registration systems in comparison with the paper-based registration system is then undertaken to reveal what changes might be made to conveyancing practices were an electronic registration system implemented. Whether, and if so, how, these changes might impact upon paper based frauds and whether they might open up new opportunities for fraud in an electronic registration system forms the next step in the analysis. The final step is to use these findings to propose measures that might be used to minimise fraud opportunities in an electronic registration system, so that as far as possible the Torrens system might be kept free from fraud, and the philosophical objectives of the system, as initially envisaged by Sir Robert Torrens, might be met.
117

Striving for National Fitness: Eugenics in Australia 1910s to 1930s

Wyndham, Diana Hardwick January 1996 (has links)
Eugenics movements developed early this century in more than 20 countries, including Australia. However, for many years the vast literature on eugenics focused almost exclusively on the history of eugenics in Britain and America. While some aspects of eugenics in Australia are now being documented, the history of this movement largely remained to be written. Australians experienced both fears and hopes at the time of Federation in 1901. Some feared that the white population was declining and degenerating but they also hoped to create a new utopian society which would outstrip the achievements, and avoid the poverty and industrial unrest, of Britain and America. Some responded to these mixed emotions by combining notions of efficiency and progress with eugenic ideas about maximising the growth of a white population and filling the "empty spaces". It was hoped that by taking these actions Australia would avoid "racial suicide" or Asian invasion and would improve national fitness, thus avoiding "racial decay" and starting to create a "paradise of physical perfection". This thesis considers the impact of eugenics in Australia by examining three related propositions: 1. that from the 1910s to the 1930s, eugenic ideas in Australia were readily accepted because of concerns about declining birth rate; 2. that, while mainly derivative, Australian eugenics had several distinctive Australian qualities; 3. that eugenics has a legacy in many disciplines, particularly family planning and public health. This examination of Australian eugenics is primarily from the perspective of the people, publications and organisations which contributed to this movement in the first half of this century. In addition to a consideration of their achievements, reference is also made to the influence which eugenic ideas had in such diverse fields as education, immigration, law, literature, politics, psychology and science.
118

Lightweight authentication and key management of wireless sensor networks for Internet of things

Porambage, P. (Pawani) 14 September 2018 (has links)
Abstract The concept of the Internet of Things (IoT) is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. Among many underlying networking technologies for the IoT, Wireless Sensor Network (WSN) technology has become an integral building block. IoT enabled sensor networks provide a wide range of application areas such as smart homes, connected healthcare, smart cities and various solutions for the manufacturing industry. The integration of WSNs in IoT will also create new security challenges for establishing secure channels between low power sensor nodes and Internet hosts. This will lead to many challenges in designing new key establishment and authentication protocols and redefining the existing ones. This dissertation addresses how to integrate lightweight key management and authentication solutions in the resource constrained sensor networks deployed in IoT domains. Firstly, this thesis elaborates how to exploit the implicit certificates to initiate secure End-to-End (E2E) communication channels between the resource constrained sensor nodes in IoT networks. Implicit certificates are used for authentication and key establishment purposes. The compliance of the security schemes is proven through performance evaluations and by discussing the security properties. Secondly, this dissertation presents the design of two lightweight group key establishment protocols for securing group communications between resource-constrained IoT devices. Finally, the thesis explores promising approaches on how to tailor the existing security protocols in accordance with IoT device and network characteristics. In particular, variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections between the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. A solutions called Collaborative HIP (CHIP) is proposed with an efficient key establishment component for the high resource-constrained devices on the IoT. The applicability of the keying mechanism is demonstrated with the implementation and the performance measurements results. / Tiivistelmä Esineiden internet (IoT) on viime aikoina yleistynyt konsepti älykkäiden objektien (smart objects) liittämiseksi internetiin käyttämällä erilaisia verkko- ja kommunikaatioteknologioita. Olennaisimpia esineiden internetin pohjalla toimivia teknologioita ovat langattomat sensoriverkot (WSN), jotka ovat esineiden internetin perusrakennuspalikoita. Esineiden internetiin kytketyt langattomat sensoriverkot mahdollistavat laajan joukon erilaisia sovelluksia, kuten älykodit, etäterveydenhuollon, älykkäät kaupungit sekä älykkäät teollisuuden sovellukset. Langattomien sensoriverkkojen ja esineiden internetin yhdistäminen tuo mukanaan myös tietoturvaan liittyviä haasteita, sillä laskentateholtaan yleensä heikot anturit ja toimilaitteet eivät kykene kovin vaativiin tietoturvaoperaatioihin, joihin lukeutuvat mm. tietoturva-avaimen muodostus ja käyttäjäntunnistus. Tässä väitöskirjassa pyritään vastaamaan haasteeseen käyttämällä kevyitä avaimenmuodostus- ja käyttäjäntunnistusratkaisuja esineiden internetiin kytketyissä resurssirajoitetuissa sensoriverkoissa. Väitöstutkimuksessa keskitytään aluksi implisiittisten sertifikaattien käyttöön tietoturvallisten end-to-end-kommunikaatiokanavien alustamisessa resurssirajoitettujen sensori- ja muiden IoT-laitteiden välillä. Implisiittisiä sertifikaatteja käytetään käyttäjäntunnistuksessa sekä avaimenmuodostuksessa. Kehitettyjen ratkaisujen soveltuvuus tarkoitukseen osoitetaan suorituskykymittauksilla sekä vertaamalla niiden tietoturvaomi- naisuuksia. Seuraavaksi väitöskirjassa esitellään kaksi kevyttä ryhmäavaimenmuodostus- protokollaa tietoturvalliseen ryhmäkommunikaatioon resurssirajoitettujen IoT-laitteiden välillä. Lopuksi väitöskirjassa tarkastellaan lupaavia lähestymistapoja olemassa olevien tietoturvaprotokollien räätäläintiin IoT-laitteiden ja -verkkojen ominaisuuksille sopiviksi. Erityistä huomiota kiinnitetään Host Identity -protokollan (HIP) eri versioiden käyttöön dynaamisten ja tietoturvallisten end-to-end-yhteyksien luomiseen toisilleen ennestään tuntemattomien erityyppisten IoT-laitteiden välillä, joiden laitteistoresurssiprofiilit voivat olla hyvin erilaiset. Väitöskirjan keskeinen tulos on väitöskirjatyössä kehitetty Colla- borative HIP (CHIP) -protokolla, joka on resurssitehokas avaimenmuodostusteknologia resurssirajoitetuille IoT-laitteille. Kehitetyn teknologian soveltuvuutta tarkoitukseensa demonstroidaan prototyyppitoteutuksella tehtyjen suorituskykymittausten avulla.
119

Avaliação da qualidade das informações sobre anomalias congênitas do sistema de informações sobre nascidos vivos / Assessment of quality of information on congenital anomalies of the information system on live births

Luquetti, Daniela Varela January 2009 (has links)
Made available in DSpace on 2011-05-04T12:42:02Z (GMT). No. of bitstreams: 0 Previous issue date: 2009 / Este estudo teve como objetivo avaliar a qualidade da informação sobre anomalias congênitas no Sistema de Informações sobre Nascidos Vivos em oito hospitais distribuídos em sete municípios do Brasil. Foi avaliada a cobertura, validade de critério e confiabilidade da codificação dos diagnósticos de anomalias congênitas em 2004 e, posteriormente, esta cobertura e validade foi comparada para o ano de 2007. Foram utilizados os bancos de dados do SINASC de 2004 e 2007 destes hospitais, consistindo de 27.945 e 25.905 nascidos vivos respectivamente. Para a validade de critério utilizou-se como padrão-ouro o ECLAMC (Estudo Colaborativo Latino Americano de Malformações Congênitas) e para a análise deconfiabilidade um profissional capacitado do SINASC. Ademais, foram descritas as intervenções realizadas pelos hospitais e suas respectivas Secretarias Municipais de Saúde(SMS) e pelo Ministério da Saúde (MS) no mesmo período. Na análise de 2004, os resultados mostraram uma elevada sub notificação das anomalias congênitas, tanto de anomalias menores como de maiores, pelo SINASC, variando entre 33,5 por cento e 88,6 por cento. A sensibilidade variou de11,4 por cento a 66,5 por cento, a especificidade, valores preditivos positivo e negativo foram maiores que80 por cento. Observou-se uma elevada concordância entre os diagnósticos descritos na declaração de nascido vivo e no ECLAMC. A confiabilidade da codificação, calculada pelo índice kappa, variou de 0,61 a 1,00 para três dígitos da CID-10 e de 0,41 a 0,78 para quatro dígitos. Na comparação entre 2004 e 2007, observou-se a persistência da baixa cobertura em todos os hospitais, exceto por um, com sub notificação de pelo menos 40 por cento das anomalias congênitas. Além disso, verificou-se piora da notificação em dois hospitais. Intervenções foram realizadas em quatro hospitais e duas SMS. Foram realizados cursos de capacitação no diagnóstico e codificação das anomalias congênitas por uma SMS. Concluiu-se que a informação sobre anomalias congênitas no SINASC, tanto em 2004 como em 2007, apresentou baixa cobertura e validade de critério, restringindo o seu uso na determinação das prevalências destas condiçõesno Brasil. A confiabilidade da codificação, apesar de apresentar valores moderados, representauma limitação importante para os estudos epidemiológicos. Poucas intervenções estão sendo realizadas objetivando a melhora da qualidade das informações sobre anomalias congênitas. Com base nos resultados deste estudo recomendamos ações urgentes pelo MS e SMS para o preenchimento deste campo no SINASC, principalmente referente à capacitação dos profissionais, assim como avaliações periódicas da qualidade. / This study aimed to evaluate the birth defects data from the Brazilian birth certificate in eight hospitals distributed in seven municipalities. We evaluated the case ascertainment, criterion validity and coding reliability of birth defect cases in 2004, and afterwards, the case ascertainment and validity was compared to the year 2007. The birth certificate databases of these hospitals, from 2004 and 2007, were used, consisting of 27,945 e 25,905 live-births, respectively. For the criterion validity we used Latin-American Collaborative Study of Congenital Malformations (ECLAMC) as the gold-standard and for the reliability analysis a trained professional from the birth certificate information system. Besides, the interventions performed by the hospitals and the corresponding Municipal Departments of Health (MDOH) and the Ministry of Health (MOH), in the same period, were described. In the 2004 analysis, minor as well as major birth defects were underreported by the birth certificate, varying from 33.5% to 88.6%.The sensitivity varied from 11.4% to 66.5%, the specificity, positive and negative predictive values were all above 80%. We observed a high concordance between the birth defects diagnosis described in the birth certificate and ECLAMC. The coding reliability, calculated by kappa, varied from 0.61 to 1.00 for three digits- and from 0.41 to 0.78 for four digits of the ICD-10. In the comparison between 2004 and 2007, we observed a persistence of the low case ascertainment in all hospitals, except for one, with underreporting of at least 40% of the birth defects. In addition, we verified a significant decrease in reporting in two of the hospitals. Interventions were performed in four hospitals and two MDOHs. Training courses on birth defects diagnosis and coding were only realized by one MDOH. We concluded that the information on birth defects in the birth certificate, in 2004 as well as in 2007, presented low case ascertainment and criterion validity, restraining its use in the determination of the prevalence of these conditions in Brazil. The coding reliability, even if it presented moderate values, represents an important limitation for epidemiologic studies. Few interventions are being performed aiming the improvement of the birth defects information quality. Considering the results from this study, we recommend urgent initiatives by the MOH and MDOHs for the birth defects data in the birth certificate, especially regarding professional training, as well as periodic quality evaluations.
120

Depoliticising Energy : A Review of Energy Security in Swedish Policy-Making

Melin, Erik January 2018 (has links)
In order to cope with the changing climate, there will be a need for mitigating transformations of a scope, speed and magnitude that are unprecedented in human history, but the consensus- and market-driven approach is inhibiting this transformation. This thesis reviews how various discourses and debates on energy policy within Swedish governments have changed between 1974 and 2017, through the lenses of energy security and depoliticisation, and how a better understanding of these debates and discourses may inform the impending large-scale transformation required to meet the challenge of climate change. Some of the main findings are that (1) nuclear power and the result of the nuclear power referendum have been decisive for energy policy, and that nuclear power will remain of vital importance in the twenty-first century. (2) Energy has become increasingly depoliticised since the 1980s, ensuing the referendum on nuclear power. (3) The discourse on energy security has shifted towards market-based solutions: in the 2000s, climate change is to be mitigated through consumer- oriented solutions such as green certificates. Through privatisation, it essentially has become up to the consumer, deciding whether to participate in mitigation of climate change.

Page generated in 0.0698 seconds